MGASA-2022-0382

Source
https://advisories.mageia.org/MGASA-2022-0382.html
Import Source
https://advisories.mageia.org/MGASA-2022-0382.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2022-0382
Related
Published
2022-10-23T22:48:35Z
Modified
2022-10-23T21:52:33Z
Summary
Updated epiphany packages fix security vulnerability
Details

In GNOME Epiphany before 41.4 and 42.x before 42.2, an HTML document can trigger a client buffer overflow (in ephystringshorten in the UI process) via a long page title. The issue occurs because the number of bytes for a UTF-8 ellipsis character is not properly considered. (CVE-2022-29536)

References
Credits

Affected packages

Mageia:8 / epiphany

Package

Name
epiphany
Purl
pkg:rpm/mageia/epiphany?arch=source&distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.38.2-1.2.mga8

Ecosystem specific

{
    "section": "core"
}